1. Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, and Katsiaryna Labunets. 2022. Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context. In Proc. of USENIX Security 31 ed.). USENIX Association, Boston, MA, 3433--3450.
2. The least secure places in the universe? A systematic literature review on information security management in higher education
3. Juliet Corbin and Anselm Strauss. 2008. Basics of Qualitative Research (3rd ed.): Techniques and Procedures for Developing Grounded Theory. Sage.
4. Stephanie de Smale, Rik van Dijk, Xander Bouwman, Jeroen van der Ham, and Michel van Eeten. 2023. No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information. In Proc. of S&P. IEEE Computer Society, Los Alamitos, CA, USA, 203--219.
5. A simple method to assess and report thematic saturation in qualitative research